Contributing Authors Preface SECTION I. Network Design and Network Modelling Chapter 1. A Taxonomy-based Approach to Design Large-scale Sensor Networks (Aravind Iyer, Sunil S. Kulkarni, Vivek Mhatre and Catherine P. Rosenberg) Chapter 2. Algorithms for Robotic Deployment of WSN in Adaptive Sampling Applications (Dan O. Popa and Frank L. Lewis) Chapter 3. A Scalable Graph Model and Coordination Algorithms for Mobile Sensor Networks (Jindong Tan) SECTION II. Network Management Chapter 4. Medium Access Control Protocols for Wireless Sensor Networks (Ali Abu-el Humos, Mihaela Cardei, Bassem Alhalabi and Sam Hsu) Chapter 5. Topology Control for Wireless Sensor Networks (Yu Wang) Chapter 6. Boundary Detection for Sensor Networks (Ren-Shiou Liu, Lifeng Sang and Prasun Sinha) Chapter 7. TPSS: A Time-based Positioning Scheme for Sensor Networks with Short Range Beacons (Fang Liu, Xiuzhen Cheng, Dong Hua and Dechang Chen) Chapter 8. Wakeup Strategies in Wireless Sensor Networks (Curt Schurgers) Chapter 9. Time-Synchronization Challenges and Techniques (Weilian Su) Chapter 10. Location Service, Information Dissemination and Object Tracking in Wireless Sensor Networks by Using Quorum Methods (Dan-Dan Liu and Xiao-Hua Jia) Chapter 11. Maximizing the Lifetime of an Always-On Wireless Sensor Network Application: A Case Study (Santosh Kumar, Anish Arora and Ten H. Lai) SECTION III. Data Management Chapter 12. Data Management in Sensor Networks (Jinbao Li, Zhipeng Cai and Jianzhong Li) Chapter 13. Time-Synchronization Challenges and Techniques (Kai-Wei Fan, Sha Liu and Prasun Sinha) Chapter 14. Performance Comparison of Clustering Schemes in Sensor Networks (Yadi Ma and Maggie Cheng) Chapter 15. Reliable and Efficient Information Forwarding and Traffic Engineering in Wireless Sensor Networks (Fernand S. Cohen, Joshua Goldberg and Jaudelice C. de Oliveira) Chapter 16. Modeling Data Gathering in Wireless Sensor Networks (Bhaskar Krishnamachari) SECTION IV. Security Chapter 17. A Survey on Sensor Network Security (Xiaojiang Du and Yang Xiao) Chapter 18. A Passive Approach to Unauthorized Sensor Node Identication (Cherita Corbett, John Copeland and Raheem Beyah)